CN108334767A - A kind of mobile terminal administration method and mobile terminal - Google Patents
A kind of mobile terminal administration method and mobile terminal Download PDFInfo
- Publication number
- CN108334767A CN108334767A CN201810220820.XA CN201810220820A CN108334767A CN 108334767 A CN108334767 A CN 108334767A CN 201810220820 A CN201810220820 A CN 201810220820A CN 108334767 A CN108334767 A CN 108334767A
- Authority
- CN
- China
- Prior art keywords
- user
- target user
- information
- attribute information
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a kind of mobile terminal administration method and mobile terminals, are used for technical field of mobile terminals.Present invention method includes:Start in target user and has added the first of application lock in application, showing application lock interface;Obtain the verification information of target user's input;If whether verification information is verified, the networked information of target user is obtained;The actual attribute information of target user is determined according to networked information, which is used to indicate the identity type of the target user;Judge whether actual attribute information is consistent with the target property information that target user has prestored;If consistent, it is determined that target user verifies successfully, the first application of unlock.When the present invention releases application lock other than using monomer information, networked information has also been used, the unlock safety using corresponding application lock has been improved, avoids user data and privacy leakage.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of mobile terminal administration method and mobile terminal.
Background technology
With becoming increasingly popular for the terminals such as mobile phone, computer, user can install many applications in the terminal, in these applications
Many applications can be related to privacy or property safety of user etc., and therefore, the privacy and safety applied in terminal also become people
The topic of growing interest.
In the related technology, user usually by one or more of application lock locking terminal apply, come reach prevent by
The effect that content in locking application is checked by other users.Application lock, which is one kind, can protect in terminal application content by easily
The application checked.Specifically, it if user wants to avoid the content in some application in terminal to be checked easily, can incite somebody to action
The application is added in application lock, i.e., locks the application by application lock.On this basis, when user needs into the application
When related interfaces, terminal, which can be shown, waits for unlock interface, and user after unlock interface unlock by can just enter the arbitrary of the application
Interface.
Currently, existing application lock unlock is typically limited to monomer information, such as verification information input by user (can be
Username and password) etc., but monomer information is easy to be stolen by others, user not high so as to cause user's application lock safety
There are still security risks for data.
Invention content
An embodiment of the present invention provides a kind of mobile terminal administration method and mobile terminals, to solve current application lock safety
Property is not high, user data the problem of there are still security risks.
In a first aspect, the application provides a kind of mobile terminal administration method, this method includes:
Start in target user and has added the first of application lock in application, showing application lock interface;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
Determine that the actual attribute information of the target user, the actual attribute information are used for table according to the networked information
Show the identity type of the target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If one
It causes, it is determined that the target user verifies successfully, unlock first application.
Further, before the networked information of the target user, the method further includes:
The camera for starting terminal built-in, is identified the face area of the target user, judges that the target is used
Whether family blinks whithin a period of time, if so, determining that the target user is live body user.
Further, the camera for starting terminal built-in, is identified the face area of the target user, wraps
It includes:
Start camera and carry out surrounding scanning, after scanning the face area for determining the target user, determines mobile terminal
The location parameter of itself;
Shooting area is adjusted according to the location parameter, so that the shooting area can cover always the target
The face area of user.
Further, described to include come the process for adjusting shooting area according to the location parameter:
When mobile terminal is overlooked or is looked up, pitch angle is obtained by the location parameter, the pitch angle is used for
The angle that instruction terminal deviates downward or upward;
The adjustment angle of the camera is calculated using following formula according to the pitch angle;
According to the shooting angle for adjusting the angle the adjustment camera, so that shooting area can cover always mesh
Mark the face area of user;
Or,
(Xworld, the Zworld) is the coordinate of the face area of the target user, described (Xcamera,
Zcamera it is) coordinate of the shooting area, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is
The angle of the shooting area, the m are the length of the camera, the dxFor the camera and the target user
Face area vertical range, the dzFor the horizontal distance of the camera and the face area of the target user.
Further, the process of the networked information for obtaining the target user includes:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, it is the target user which, which points out information,
Networked information.
Further, described that the process packet that information determines the actual attribute information of the target user is pointed out according to attribute
It includes:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes
The contact person of target user and the target user;
Relationship is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user
Iterate to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third of each candidate attribute information of each user when iteration ends is exported
Probability;
For the target user, using the highest candidate attribute information of third probability as the practical category of the target user
Property information, the target user belong to each user.
Further, first probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i
The quantity of people;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is to appoint
The quantity of the contact person of what value.
Further, following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j;
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j
When, the βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, institute
State βkSecond value, first numerical value is taken to be more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
Further, the method further includes:
The instruction of the application addition application lock of target user couple second is obtained, second application is to be not added with answering for application lock
With;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
Determine that the actual attribute information of the target user, the actual attribute information are used for table according to the networked information
Show the identity type of the target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If one
It causes, it is determined that the target user verifies successfully, to the second application addition application lock.
Second aspect, the application also provide a kind of mobile terminal, including memory, processor and are stored in the memory
Computer program that is upper and can running on the processor, wherein can be with when the processor execution computer program
Realize any method in first aspect.
In the present invention, starts in target user and added the first of application lock in application, display application lock interface, is determining mesh
When marking verification information input by user and being verified, the networked information of target user can be also obtained, and determine according to networked information
The actual attribute information of target user, which is used to indicate the identity type of target user, only real when determining
When border attribute information is consistent with the target property information that target user has prestored, it just can determine whether that target user verifies successfully, unlock
First application improves so the present invention has also used networked information other than using monomer information using corresponding application lock
Unlock safety, avoid user data and privacy leakage.
Description of the drawings
Fig. 1 is one embodiment schematic diagram of mobile terminal administration method in the embodiment of the present invention;
Fig. 2 is one embodiment schematic diagram of mobile terminal in the embodiment of the present invention.
Specific implementation mode
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
The every other embodiment that member is obtained without making creative work should all belong to the model that the present invention protects
It encloses.
The (if present)s such as term " first ", " second " in description and claims of this specification and above-mentioned attached drawing
It is for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that the number used in this way
According to can be interchanged in the appropriate case, so as to the embodiments described herein can in addition to the content for illustrating or describing herein with
Outer sequence is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover non-exclusive packet
Contain, for example, containing what the process of series of steps or unit, method, system, product or equipment were not necessarily limited to clearly to list
Those steps or unit, but may include not listing clearly or intrinsic for these processes, method, product or equipment
Other steps or unit.
Referring to Fig. 1, one embodiment of mobile terminal administration method includes in the embodiment of the present invention:
S101, the first of application lock has been added in application, display application lock interface in target user's startup;
S102, the verification information for obtaining target user's input;
Wherein, the verification information of input can be numerical ciphers, gesture, the verification informations such as fingerprint.
If whether S103, the verification information are verified, the networked information of the target user is obtained;
S104, the actual attribute information that the target user is determined according to the networked information, the actual attribute information
Identity type for indicating the target user;
S105, judge whether the actual attribute information is consistent with the target property information that the target user has prestored;
If consistent, it is determined that the target user verifies successfully, unlock first application.
Wherein, first application is unlocked, that is, locking of the application lock to first application is released, so that user can be normal
It first is applied using this.
In the present invention, starts in target user and added the first of application lock in application, display application lock interface, is determining mesh
When marking verification information input by user and being verified, the networked information of target user can be also obtained, and determine according to networked information
The actual attribute information of target user, which is used to indicate the identity type of target user, only real when determining
When border attribute information is consistent with the target property information that target user has prestored, it just can determine whether that target user verifies successfully, unlock
First application improves so the present invention has also used networked information other than using monomer information using corresponding application lock
Unlock safety, avoid user data and privacy leakage.
Further, it in the embodiment of the present invention, before the networked information of the target user described in acquisition for mobile terminal, also needs
Further to judge whether the target user is live body user, to prevent the case where computer makes repeated attempts.Therefore, in institute
Before the networked information for stating target user, the method further includes:
The camera for starting terminal built-in, is identified the face area of the target user, judges that the target is used
Whether family blinks whithin a period of time, if so, determining that the target user is live body user.
Further, since the parameters such as target user's face orientation may change, in order to ensure that camera can be aligned
The face of target user needs to start camera progress surrounding scanning, after scanning the face area for determining target user, it is also necessary to
Mobile terminal determines the location parameter of itself, then adjusts shooting area according to the location parameter, so that shooting area one
Directly it is capable of the face area of coverage goal user.The i.e. described camera for starting terminal built-in, to the face of the target user
Region is identified, including:
Start camera and carry out surrounding scanning, after scanning the face area for determining the target user, determines mobile terminal
The location parameter of itself;
Shooting area is adjusted according to the location parameter, so that the shooting area can cover always the target
The face area of user.
Further, described to include come the process for adjusting shooting area according to the location parameter:
When mobile terminal is overlooked or is looked up, pitch angle is obtained by the location parameter, the pitch angle is used for
The angle that instruction terminal deviates downward or upward;
The adjustment angle of the camera is calculated using following formula according to the pitch angle;
According to the shooting angle for adjusting the angle the adjustment camera, so that shooting area can cover always mesh
Mark the face area of user;
Or,
(Xworld, the Zworld) is the coordinate of the face area of the target user, described (Xcamera,
Zcamera it is) coordinate of the shooting area, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is
The angle of the shooting area, the m are the length of the camera, the dxFor the camera and the target user
Face area vertical range, the dzFor the horizontal distance of the camera and the face area of the target user.
Further, the process of the networked information for obtaining the target user includes:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, it is the target user which, which points out information,
Networked information.
Further, described that the process packet that information determines the actual attribute information of the target user is pointed out according to attribute
It includes:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes
The contact person of target user and the target user;
Relationship is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user
Iterate to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third of each candidate attribute information of each user when iteration ends is exported
Probability;
For the target user, using the highest candidate attribute information of third probability as the practical category of the target user
Property information, the target user belong to each user.
Further, first probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i
The quantity of people;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is to appoint
The quantity of the contact person of what value.
Further, following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j;
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j
When, the βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, institute
State βkSecond value, first numerical value is taken to be more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
Further, the method further includes:
The instruction of the application addition application lock of target user couple second is obtained, second application is to be not added with answering for application lock
With;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
Determine that the actual attribute information of the target user, the actual attribute information are used for table according to the networked information
Show the identity type of the target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If one
It causes, it is determined that the target user verifies successfully, to the second application addition application lock.
As shown in Fig. 2, the present invention also provides a kind of mobile terminal, which includes memory 201, processor 202
And it is stored in the computer program 203 that can be run on the memory and on the processor, wherein the processor 202
The mobile terminal described in any embodiment in above-mentioned mobile terminal administration method may be implemented when executing the computer program 203
Management method.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit
It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before
Stating embodiment, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding
The technical solution recorded in each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
Modification or replacement, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of mobile terminal administration method, which is characterized in that it is applied to mobile terminal, the method includes:
Start in target user and has added the first of application lock in application, showing application lock interface;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
The actual attribute information of the target user is determined according to the networked information, the actual attribute information is for indicating institute
State the identity type of target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If consistent,
Determine that the target user verifies successfully, unlock first application.
2. according to the method described in claim 1, it is characterized in that, before the networked information of the target user, the side
Method further includes:
The camera for starting terminal built-in, is identified the face area of the target user, judges that the target user is
It is no to blink whithin a period of time, if so, determining that the target user is live body user.
3. according to the method described in claim 2, it is characterized in that, it is described start terminal built-in camera, to the target
The face area of user is identified, including:
Start camera and carry out surrounding scanning, after scanning the face area for determining the target user, determines mobile terminal itself
Location parameter;
Shooting area is adjusted according to the location parameter, so that the shooting area can cover always the target user
Face area.
4. according to the method described in claim 3, it is characterized in that, described adjust shooting area according to the location parameter
Process includes:
When mobile terminal is overlooked or is looked up, pitch angle is obtained by the location parameter, the pitch angle is used to indicate
The angle that terminal deviates downward or upward;
The adjustment angle of the camera is calculated using following formula according to the pitch angle;
According to the shooting angle for adjusting the angle the adjustment camera, so that shooting area always being capable of coverage goal use
The face area at family;
Or,
(Xworld, the Zworld) is the coordinate of the face area of the target user, and (Xcamera, the Zcamera) is
The coordinate of the shooting area, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is the shooting area
Angle, the m be the camera length, the dxFor the camera and the face area of the target user
Vertical range, the dzFor the horizontal distance of the camera and the face area of the target user.
5. according to the method described in claim 1, it is characterized in that, the process of the networked information for obtaining the target user
Including:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, which points out the connection that information is the target user
Net information.
6. according to the method described in claim 5, it is characterized in that, described point out information according to attribute and determine the target user
The process of actual attribute information include:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes target
The contact person of user and the target user;
Relationship iteration is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user
Calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third for exporting each candidate attribute information of each user when iteration ends is general
Rate;
For the target user, believe the highest candidate attribute information of third probability as the actual attribute of the target user
Breath, the target user belong to each user.
7. according to the method described in claim 6, it is characterized in that, calculating first probability as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact person that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i
Quantity;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is any value
Contact person quantity.
8. according to the method described in claim 6, it is characterized in that, repeating following formula, iterative calculation described second is general
Rate:
Wi,j=Vi,j;
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j, institute
State βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, the βkIt takes
Second value, first numerical value are more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
9. according to the method described in claim 1, it is characterized in that, the method further includes:
The instruction of the application addition application lock of target user couple second is obtained, second application is to be not added with the application of application lock;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
The actual attribute information of the target user is determined according to the networked information, the actual attribute information is for indicating institute
State the identity type of target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If consistent,
Determine that the target user verifies successfully, to the second application addition application lock.
10. a kind of mobile terminal, which is characterized in that including memory, processor and be stored on the memory and can be in institute
State the computer program run on processor, wherein the processor may be implemented right when executing the computer program and want
Seek any method in 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810220820.XA CN108334767A (en) | 2018-03-16 | 2018-03-16 | A kind of mobile terminal administration method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810220820.XA CN108334767A (en) | 2018-03-16 | 2018-03-16 | A kind of mobile terminal administration method and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108334767A true CN108334767A (en) | 2018-07-27 |
Family
ID=62930936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810220820.XA Pending CN108334767A (en) | 2018-03-16 | 2018-03-16 | A kind of mobile terminal administration method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108334767A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216887A (en) * | 2008-01-04 | 2008-07-09 | 浙江大学 | An automatic computer authentication method for photographic faces and living faces |
CN105847127A (en) * | 2016-05-04 | 2016-08-10 | 腾讯科技(深圳)有限公司 | User attribute information determination method and server |
CN105933215A (en) * | 2016-07-09 | 2016-09-07 | 东莞市华睿电子科技有限公司 | Chat message withdraw control method based on instant messaging |
-
2018
- 2018-03-16 CN CN201810220820.XA patent/CN108334767A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216887A (en) * | 2008-01-04 | 2008-07-09 | 浙江大学 | An automatic computer authentication method for photographic faces and living faces |
CN105847127A (en) * | 2016-05-04 | 2016-08-10 | 腾讯科技(深圳)有限公司 | User attribute information determination method and server |
CN105933215A (en) * | 2016-07-09 | 2016-09-07 | 东莞市华睿电子科技有限公司 | Chat message withdraw control method based on instant messaging |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200293645A1 (en) | Hardening Security Images | |
Thorpe et al. | Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. | |
US20090076965A1 (en) | Counteracting random guess attacks against human interactive proofs with token buckets | |
US9747434B1 (en) | Authenticating with an external device by providing a message having message fields arranged in a particular message field order | |
CN110414271A (en) | A kind of private data guard method, device and computer readable storage medium | |
CN105868970A (en) | Authentication method and electronic device | |
CN107491674A (en) | Feature based information carries out the method and device of user's checking | |
WO2014151890A1 (en) | Securely transferring authentication information | |
CN105868610A (en) | Method and system for realizing user authentication through biological characteristic information | |
CN109639724A (en) | Password method for retrieving, password device for retrieving, computer equipment and storage medium | |
CN111241566A (en) | Policy management method, electronic device, computer device, and storage medium | |
KR101808215B1 (en) | User authentication method, authentication apparatus, and terminal | |
US6134657A (en) | Method and system for access validation in a computer system | |
CN108334767A (en) | A kind of mobile terminal administration method and mobile terminal | |
CN107391987A (en) | Application guard method, device and electronic equipment based on living things feature recognition | |
CN108205630A (en) | Resource access method and device based on SeLinux under a kind of multi-user | |
CN109086624A (en) | login method and device | |
CN108230211A (en) | A kind of resident information authentication method based on property information | |
JPH11328118A (en) | User authenticating method and storage medium | |
CN104615553B (en) | Data capture method, data acquisition facility and terminal | |
CN110363007B (en) | Method and device for updating trusted policy | |
CN110087235B (en) | Identity authentication method and device, and identity authentication method and device adjustment method and device | |
CN106535300A (en) | Network access method and device | |
CN108449337A (en) | A kind of password method for retrieving | |
TWM601847U (en) | System for authentication with device binding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180727 |
|
RJ01 | Rejection of invention patent application after publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1263404 Country of ref document: HK |